The teenage attackers fled when the two men fought back 当那两名男子还击时,袭击他们的少年逃之夭夭。
He appealed for information from anyone who saw the attackers. 他呼吁任何看见袭击者的人提供信息。
The dead men could have been the victims of mistaken identity. Their attackers may have wrongly believed them to be soldiers. 这些死者可能是替罪羊,袭击者可能误以为他们是当兵的。
The attackers launched another vicious onslaught on their victim 袭击者再度凶残地攻击受害人。
The attackers were said to be taking revenge on the 14-year-old, claiming he was a school bully 据说,这些攻击者是在报复这个14岁的孩子,说他是学校的小霸王。
Unknown attackers riddled two homes with gunfire 来路不明的袭击者用枪炮将两处住宅打得千疮百孔。
They issued an ultimatum to the police to rid an area of racist attackers, or they will take the law into their own hands. 他们向警方发出了最后通牒,要求肃清整个地区的种族主义暴徒,否则他们将自行采取行动。
Bravely, jim walked into his attackers. 吉姆勇敢地回击了向他进攻的那些人们。
Cage let out in all directions but his attackers were too strong for him. 凯奇左踢右打但攻击他的人比他厉害得多。
Although the files were erroneously placed, this example underscores the importance of guarding your file system against attackers. 虽然文件被放错了位置,但是这个例子强调了针对攻击者保护文件系统的重要性。
This setting ensures that attackers cannot modify the JNDI namespace. 这一设置确保攻击者不能修改JNDI命名空间。
This allows for file encryption in order to protect confidential data from attackers with physical access to the computer. EFS允许文件加密,以便保护保密的数据不会被攻击者以直接访问计算机的方式进行窃取。
Also, not all hackers are attackers& many hackers write the programs that defend you! 同样,并非所有黑客都是攻击者-许多黑客编写保护您的程序!
Police have arrested six alleged attackers, who are accused of rape and attempted murder. 警方逮捕了六名据称参与袭击的人,他们被控强奸和谋杀未遂。
Though the attackers have breached the communications, they must still depend on the BIOS and OS interfaces. 尽管攻击代码已经破坏了通信系统,但他们的活动仍须依靠基本输入输出系统接口和操作系统接口。
The victim was beaten to death by his attackers. 受害者被歹徒打死了。
Shoulder-to-shoulder, we fought against the attackers. 我们肩并肩的和袭击着战斗着。
Web software is buggy, attackers find and exploit these bugs. Web软件是错漏不断的,为攻击者发现和利用。
The drone could also simulate the manoeuvres of fighters and attackers to make the target practice more realistic. 无人机也可以模拟战斗机和攻击机的动作使打靶变得更真实。
He drove off his attackers. 他把攻击他的人都打退了。
In the west of the city, another two suicide attackers detonated explosives outside a police station. 在这座城市西部一个警察局外,另外两名自杀式爆炸者引爆了炸药。
In this article, we discussed how attackers use cross-site scripting as a technique to launch attacks against web sites. 本文中,我们讨论了攻击者如何使用跨站点脚本编制作为对网站发动攻击的技术。
The attackers left this mark. 袭击者留下了这个标志。
He felled his three attackers at a single blow. 他一下子撩倒了三个袭击他的人。
Their attackers were not so careful. 而袭击者就不用这么小心翼翼了。
The garrison fought off the attackers. 驻军击退了袭击者。
However, the defense system can be weakened if the attackers manage to seize the other baronies first. 然而,如果攻击者首先围攻了其他的男爵领地,那么防御系统就可能会弱化。
This Trojan allows attackers to access your computer, stealing passwords and personal data. 这个木马运行攻击者访问你的计算机,窃取密码和个人数据。
Since strong names are cryptographically verified, attackers cannot impersonate rightful assemblies and use their permissions. 由于强名称以加密方式验证,所以,攻击者无法模拟合法的程序集和使用它们的权限。
Handled securely, it also thwarts potential attackers who may attempt to intercept and tamper with the upgrade. 这种机制不仅具有安全的处理方式,还可阻止试图截获并篡改升级的潜在攻击者。